http://bugs.winehq.com/show_bug.cgi?id=1027
------- Additional Comments From z_god@wanadoo.nl 2003-23-06 05:44 ------- Bug comments restored from Gmane.org:
The bug appears with both wine 20020710 and wine 20020904 on a SuSe 7.3 machine, using a copy of a Windows 98 installation. The program is FITCH.EXE (see http://www-csli.stanford.edu/LPL ). It is not free, but can be obtained from me, if needed.
Stdout output of the command
wine /usr/local/LPL/LPL\ Software/Fitch\ Folder/FITCH.EXE
After the follwing probably harmless problems (I have deleted repeated stuff):
fixme:win32:CreateMailslotA ("\\.\mailslot\Openproof/Fitch 1.0",520,100,(nil)): stub fixme:win32:CreateMailslotA ("\\.\mailslot\Z/\usr\local\LPL\LPL Software\Fitch Folder\FITCH.EXE",520,100,(nil)): stub fixme:ntdll:RtlAddAccessAllowedAce (0x405c58d4,0x00000002,0x000f003f,0x403bef78),stub! fixme:reg:RegFlushKey (48): stub fixme:win32:GetMailslotInfo (0001): stub fixme:event:EVENT_ProcessEvent Got SelectionNotify - must not happen! fixme:win32:GetMailslotInfo (0001): stub
then the error occurs (infinitely often):
err:ntdll:RtlpWaitForCriticalSection section 0x40b25704 "x11drv_main.c: X11DRV_CritSection" wait timed out, retrying (60 sec) tid=0809df48 wine: Unhandled exception, starting debugger...
Unfortunately, the debugger window does not appear. With an earlier version of wine (20020710), it appears, and sometimes even the error does not appear. If needed, I can try to reconstruct the debugger output.
Stderr Output of the command
wine --debugmsg +relay /usr/local/LPL/LPL\ Software/Fitch\ Folder/FITCH.EXE
[snip]
Some 400 lines of the section before the error occurs:
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 0809d330:Call kernel32.GetTickCount() ret=40fee0bb 0809d330:Ret kernel32.GetTickCount() retval=00014386 ret=40fee0bb 0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 080713c8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 080713c8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c fixme:event:EVENT_ProcessEvent Got SelectionNotify - must not happen! 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Ret x11drv.MsgWaitForMultipleObjectsEx() retval=00000000 ret=408fd663 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 080713c8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 080713c8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 080713c8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 080713c8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 080713c8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 080713c8:Call kernel32.WaitForMultipleObjectsEx(00000001,405c6368,00000000,00000000,00000000) ret=40b05dd3 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call user32.GetPropA(00010021,0000c01c) ret=1801785d 080713c8:Ret kernel32.WaitForMultipleObjectsEx() retval=00000102 ret=40b05dd3 080713c8:Ret x11drv.MsgWaitForMultipleObjectsEx() retval=00000102 ret=408fd663 080713c8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 080713c8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 080713c8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 080713c8:Ret kernel32.GetThreadQueue16() retval=00000237 ret=408d4a27 080713c8:Call kernel32.GlobalLock16(00000237) ret=408d4a4b 080713c8:Ret kernel32.GlobalLock16() retval=403b8f18 ret=408d4a4b 0809dfa8:Ret user32.GetPropA() retval=00000000 ret=1801785d 0809dfa8:Call user32.CallNextHookEx(4b48008c,00000000,00000001,48846b34) ret=18017681 0809dfa8:Ret user32.CallNextHookEx() retval=00000000 ret=18017681 0809dfa8:Ret user32.PeekMessageA() retval=00000001 ret=180177b6 0809dfa8:Call user32.TranslateMessage(48846c54) ret=180177e2 0809dfa8:Ret user32.TranslateMessage() retval=00000000 ret=180177e2 0809dfa8:Call user32.DispatchMessageA(48846c54) ret=180177e9 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,40e706ba) ret=408e660e 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e660e 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,40e706c8) ret=408e662c 0809dfa8:Ret kernel32.HeapValidate() retval=00000001 ret=408e662c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01b,40931f30,0000003c) ret=408b56d3 080713c8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 080713c8:Ret kernel32.GetThreadQueue16() retval=00000237 ret=408d4a27 080713c8:Call kernel32.GlobalLock16(00000237) ret=408d4a4b 080713c8:Ret kernel32.GlobalLock16() retval=403b8f18 ret=408d4a4b 080713c8:Call kernel32.ReleaseThunkLock(405c6544) ret=408fd6cc 080713c8:Ret kernel32.ReleaseThunkLock() retval=00000000 ret=408fd6cc 080713c8:Ret user32.PeekMessageA() retval=00000000 ret=004072c9 080713c8:Call kernel32.GetMailslotInfo(00000001,00000000,405c6628,00000000,00000000) ret=00407051 fixme:win32:GetMailslotInfo (0001): stub 080713c8:Ret kernel32.GetMailslotInfo() retval=00000001 ret=00407051 080713c8:Call kernel32.ReadFile(00000001,405c6b0c,00000208,405c6620,00000000) ret=00407093 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000d ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5868 L"theAwtToolkitWindow",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call window proc 0x18017410 (hwnd=00010021,msg=WM_TIMER,wp=00000101,lp=00000000) 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call user32.GetCursorPos(48846ad4) ret=18017440 0809dfa8:Call x11drv.GetCursorPos(48846ad4) ret=408c6813 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 080713c8:Ret kernel32.ReadFile() retval=00000000 ret=00407093 080713c8:Call kernel32.Sleep(00000208) ret=00407100 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Ret x11drv.GetCursorPos() retval=000001bf ret=408c6813 0809dfa8:Ret user32.GetCursorPos() retval=00000001 ret=18017440 0809dfa8:Call user32.WindowFromPoint(00000224,000001bf) ret=18017450 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call ntdll.RtlAllocateHeap(40360000,00000000,00000080) ret=408dded5 0809dfa8:Ret ntdll.RtlAllocateHeap() retval=403e8b40 ret=408dded5 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call ntdll.RtlAllocateHeap(40360000,00000000,00000080) ret=408dded5 0809dfa8:Ret ntdll.RtlAllocateHeap() retval=403e8bc8 ret=408dded5 0809dfa8:Call ntdll.RtlFreeHeap(40360000,00000000,403e8bc8) ret=408ddead 0809dfa8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=408ddead 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,18003572) ret=408e660e 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e660e 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,18003580) ret=408e662c 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e662c 0809dfa8:Call kernel32.IsBadReadPtr16(18003580,0000000e) ret=408e6641 0809dfa8:Ret kernel32.IsBadReadPtr16() retval=00000001 ret=408e6641 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call window proc 0x18003580 (hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call user32.GetPropA(00010023,0000c01c) ret=1800359b 0809dfa8:Ret user32.GetPropA() retval=412d1860 ret=1800359b 0809dfa8:Call user32.CallWindowProcA(409225e0,00010023,00000084,00000000,01bf0224) ret=18004571 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,409225d2) ret=408e660e 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e660e 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,409225e0) ret=408e662c 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e662c 0809dfa8:Call kernel32.IsBadReadPtr16(409225e0,0000000e) ret=408e6641 0809dfa8:Ret kernel32.IsBadReadPtr16() retval=00000001 ret=408e6641 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call window proc 0x409225e0 (hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call user32.DefWindowProcA(00010023,00000084,00000000,01bf0224) ret=408e623b 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Ret user32.DefWindowProcA() retval=00000001 ret=408e623b 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Ret window proc 0x409225e0 (hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) retval=00000001 0809dfa8:Ret user32.CallWindowProcA() retval=00000001 ret=18004571 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Ret window proc 0x18003580 (hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) retval=00000001 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call ntdll.RtlFreeHeap(40360000,00000000,403e8b40) ret=408e3da6 0809dfa8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=408e3da6 0809dfa8:Ret user32.WindowFromPoint() retval=00010023 ret=18017450 0809dfa8:Call user32.GetPropA(00010023,0000c01c) ret=18017465 0809dfa8:Ret user32.GetPropA() retval=412d1860 ret=18017465 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01b,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000d ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5868 L"theAwtToolkitWindow",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Ret window proc 0x18017410 (hwnd=00010021,msg=WM_TIMER,wp=00000101,lp=00000000) retval=00000000 0809dfa8:Ret user32.DispatchMessageA() retval=00000000 ret=180177e9 0809dfa8:Call user32.PeekMessageA(48846c54,00000000,00000000,00000000,00000001) ret=180177f8 0809dfa8:Call x11drv.MsgWaitForMultipleObjectsEx(00000000,00000000,00000000,00000000,00000000) ret=408fd663 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call kernel32.WaitForMultipleObjectsEx(00000001,48846954,00000000,00000000,00000000) ret=40b05dd3 0809dfa8:Ret kernel32.WaitForMultipleObjectsEx() retval=00000102 ret=40b05dd3 0809dfa8:Ret x11drv.MsgWaitForMultipleObjectsEx() retval=00000102 ret=408fd663 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.ReleaseThunkLock(48846b30) ret=408fd6cc 0809dfa8:Ret kernel32.ReleaseThunkLock() retval=00000000 ret=408fd6cc 0809dfa8:Ret user32.PeekMessageA() retval=00000000 ret=180177f8 0809dfa8:Call user32.WaitMessage() ret=1801776a 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.ReleaseThunkLock(48846a3c) ret=408cc817 0809dfa8:Ret kernel32.ReleaseThunkLock() retval=00000000 ret=408cc817 0809dfa8:Call x11drv.MsgWaitForMultipleObjectsEx(00000001,48846ab4,ffffffff,000000ff,00000000) ret=408cc83f 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call kernel32.WaitForMultipleObjectsEx(00000002,48846850,00000000,ffffffff,00000000) ret=40b05dd3 0809d910:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809d910:Call user32.GetOpenClipboardWindow() ret=40b03a47 0809d910:Ret user32.GetOpenClipboardWindow() retval=00010021 ret=40b03a47 0809d910:Call user32.CLIPBOARD_EmptyCache(00000001) ret=40b03a87 0809d910:Ret user32.CLIPBOARD_EmptyCache() retval=00000001 ret=40b03a87 0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d910:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809d910:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809d910:Call user32.GetAncestor(00010021,00000002) ret=40b03ad3 0809d910:Call ntdll.RtlAllocateHeap(40360000,00000000,00000040) ret=408e22b9 0809d910:Ret ntdll.RtlAllocateHeap() retval=403e8b40 ret=408e22b9 0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809d910:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809d910:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809d910:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809d910:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809d910:Call ntdll.RtlFreeHeap(40360000,00000000,403e8b40) ret=408e1b90 0809d910:Ret ntdll.RtlFreeHeap() retval=00000001 ret=408e1b90 0809d910:Ret user32.GetAncestor() retval=00010021 ret=40b03ad3 0809d910:Call user32.WIN_GetPtr(00010021) ret=40b0dbed 0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809d910:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809d910:Ret user32.WIN_GetPtr() retval=403d53b8 ret=40b0dbed 0809d910:Call user32.USER_Unlock() ret=40b0dc15 0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809d910:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809d910:Ret user32.USER_Unlock() retval=00000000 ret=40b0dc15 0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d910:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809d910:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d910:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d910:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809d910:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Ret kernel32.WaitForMultipleObjectsEx() retval=00000001 ret=40b05dd3 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d330:Call kernel32.GetTickCount() ret=40fedefa 0809d330:Ret kernel32.GetTickCount() retval=0001439a ret=40fedefa
Then come about 10000 quite boring lines, containing the following:
These four lines:
0809d330:Call kernel32.GetTickCount() ret=40fee0bb 0809d330:Ret kernel32.GetTickCount() retval=00015683 ret=40fee0bb 0809d330:Call kernel32.GetTickCount() ret=40fedefa 0809d330:Ret kernel32.GetTickCount() retval=00015695 ret=40fedefa
repeatedly interleaved with approx. 25 times these four lines:
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e
Then comes the error:
0809d330:Call kernel32.GetTickCount() ret=40fee0bb 0809d330:Ret kernel32.GetTickCount() retval=00015699 ret=40fee0bb 0809d190:Ret kernel32.WaitForMultipleObjects() retval=00000102 ret=1a00e7d8 err:ntdll:RtlpWaitForCriticalSection section 0x40b25704 "x11drv_main.c: X11DRV_CritSection" wait timed out, retrying (60 sec) tid=0809dfa8 0809d190:Call winmm.timeGetTime() ret=1a00e815 0809d190:Call kernel32.ReleaseThunkLock(47816d30) ret=40fee8cc 0809d190:Ret kernel32.ReleaseThunkLock() retval=00000000 ret=40fee8cc 0809d190:Call kernel32.RestoreThunkLock(00000000) ret=40fee8d5 0809d190:Ret kernel32.RestoreThunkLock() retval=00000000 ret=40fee8d5 0809d190:Call kernel32.IsBadWritePtr(403d0ae8,00000054) ret=40fee120 0809d190:Ret kernel32.IsBadWritePtr() retval=00000000 ret=40fee120 0809d190:Ret winmm.timeGetTime() retval=00015695 ret=1a00e815 0809d190:Call kernel32.Sleep(00000001) ret=1a00e7be 0809d330:Call kernel32.GetTickCount() ret=40fedefa 0809d330:Ret kernel32.GetTickCount() retval=000157d1 ret=40fedefa 0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e
and then the last four lines again get repeated many times etc.
------- Additional Comments From till <at> informatik.uni-bremen.de 2002-10-01 10:32 ------- Created an attachment (id=306) --> (http://bugs.winehq.com/attachment.cgi?id=306&action=view) Relay trace with PeekMessageA that does not return